Vulnerability Name: | CVE-2001-0825 (CCN-6804) | ||||||||
Assigned: | 2001-06-29 | ||||||||
Published: | 2001-06-29 | ||||||||
Updated: | 2018-05-03 | ||||||||
Summary: | Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-01:47 xinetd contains multiple vulnerabilities Source: CCN Type: BugTraq Mailing List, Fri Jun 08 2001 - 09:10:41 CDT potential buffer overflow in xinetd-2.1.8.9pre11-1 Source: MITRE Type: CNA CVE-2001-0825 Source: CONECTIVA Type: Patch, Vendor Advisory CLA-2001:406 Source: CCN Type: Conectiva Linux Announcement CLSA-2001:404 xinetd Source: CCN Type: Immunix OS Security Advisory IMNX-2001-70-029-01 xinetd Source: IMMUNIX Type: UNKNOWN IMNX-2001-70-029-01 Source: CCN Type: RHSA-2001-092 Updated xinetd package available for Red Hat Linux 7 and 7.1 Source: CCN Type: OSVDB ID: 12124 xinetd Internal String Handling Routine Remote Overflow Source: REDHAT Type: Patch, Vendor Advisory RHSA-2001:092 Source: BID Type: Patch, Vendor Advisory 2971 Source: CCN Type: BID-2971 Xinetd Zero String Length Buffer Overflow Vulnerability Source: CCN Type: SuSE Security Announcement SuSE-SA:2001:022 xinetd Source: XF Type: UNKNOWN xinetd-zero-length-bo(6804) Source: XF Type: UNKNOWN xinetd-zero-length-bo(6804) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |